• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.033 seconds

The Influence of Financial Inclusion on MSMEs' Performance Through Financial Intermediation and Access to Capital

  • RATNAWATI, Kusuma
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.205-218
    • /
    • 2020
  • This study aims to analyze the influence of financial inclusion on micro-, small-, and medium-sized enterprises' (MSMEs) performance and examine the mediation role of financial intermediation and access to capital. The object of this study is MSMEs in Malang, Indonesia. The sample consists of 100 MSME actors in Malang City, which is determined using Roscoes theory. The data is collected using Simple Random Sampling method, by distributing questionnaire measured with Likert scales. The hypotheses proposed in this study are examined using Partial Least Square (PLS) model. The results of this study show that financial inclusion influences MSMEs' performance both directly and indirectly through mediation from financial intermediation and access to capital. The direct influence means that the efforts to increase access to financial services, especially access to credit financing for MSMEs, will be able to increase market share, number of workers, sales, as well as profit of the MSMEs. Increased financial inclusion has a major impact on improving MSMEs' performance through financial intermediation compared to access to capital. This means that the increase of financial access for MSMEs followed by an increase in financial intermediation in the form of a financial service approach to MSMEs will improve MSMEs' performance.

A Trust Management Model for PACS-Grid

  • Cho, Hyun-Sook;Lee, Bong-Hwan;Lee, Kyu-Won;Lee, Hyoung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.144-149
    • /
    • 2007
  • Grid technologies make it possible for IT resources to be shared across organizational and security domains. The traditional identity-based access control mechanisms are unscalable and difficult to manage. Thus, we propose the FAS (Federation Agent Server) model which is composed of three modules: Certificate Conversion Module (CCM), Role Decision Module (RDM), and Authorization Decision Module (ADM). The proposed FAS model is an extended Role-Based Access Control (RBAC) model which provides resource access capabilities based on roles assigned to the users. FAS can solve the problem of assigning multiple identities to a shared local name in grid-map file and mapping the remote entity's identity to a local name manually.

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

A Splitter Location-Allocation Problem in Designing FTTH-PON Access Networks (FTTH-PON 가입자망 설계에서 Splitter Location-Allocation 문제)

  • Park, Chan-Woo;Lee, Young-Ho;Han, Jung-Hee
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.36 no.2
    • /
    • pp.1-14
    • /
    • 2011
  • In this paper, we deal with an access network design problem of fiber-to-the-home passive optical network (FTTH-PON). The FTTH-PON network design problem seeks to minimize the total cost of optical splitters and cables that provide optical connectivity between central office and subscribers. We develop a flow-based mixed integer programming (MIP) model with nonlinear link cost. By developing valid inequalities and preprocessing rules, we enhance the strength of the proposed MIP model in generating tight lower bounds for the problem. We develop an effective Tabu Search (TS) heuristic algorithm that provides good quality feasible solutions to the problem. Computational results demonstrate that the valid inequalities and preprocessing rules are effective for improving the LP-relaxation lower bound and TS algorithm finds good quality solutions within reasonable time bounds.

Management of Advanced Information Communication Processing System using TMN Technology (TMN 개념을 이용한 대용량 통신처리 시스템 관리)

  • 권선준;이현우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.11a
    • /
    • pp.290-293
    • /
    • 1998
  • 대용량 통신처리 시스템은 전화망, 패킷망 및 ISDN 망 둥 다양한 통신망으로부터 접속하는 사용자들에게 text 기반의 서비스 및 인터넷 서비스의 제공을 목표로 한다. 대용량통신처리시스템은 전화망, 패킷망 및 ISDN 망을 access 망으로 하고, 패킷망 및 Internet을 전달망으로 하여 다양한 서비스를 제공하는 구조를 갖는다. 대용량통신처리시스템은 제공하는 서비스들에 대하여 access 망에 대한 과금 및 전달망에 대한 과금 데이터를 제공하여 정확한 과금이 부과될 수 있는 기본 데이터를 제공한다. 대용량통신처리시스템은 이러한 망을 access하는 망접속 서브시스템들로 구성되는데 본 논문에서는 각 망접속 서브시스템들 및 구성요소들의 관리를 전담하는 LOMS(Local Operations and Management System)의 소프트웨어 구성 및 관리절차에 대하여 기술한다.

  • PDF

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Spectrum Management Models for Cognitive Radios

  • Kaur, Prabhjot;Khosla, Arun;Uddin, Moin
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.222-227
    • /
    • 2013
  • This paper presents an analytical framework for dynamic spectrum allocation in cognitive radio networks. We propose a distributed queuing based Markovian model each for single channel and multiple channels access for a contending user. Knowledge about spectrum mobility is one of the most challenging problems in both these setups. To solve this, we consider probabilistic channel availability in case of licensed channel detection for single channel allocation, while variable data rates are considered using channel aggregation technique in the multiple channel access model. These models are designed for a centralized architecture to enable dynamic spectrum allocation and are compared on the basis of access latency and service duration.

An Analysis of Access Points for Electronic Reference Service System Displayed on the Home Pages of Academic Libraries (대학도서관 홈페이지상의 전자 참고서비스시스템을 위한 액세스 포인트 분석)

  • 최은주
    • Journal of the Korean Society for information Management
    • /
    • v.16 no.3
    • /
    • pp.31-48
    • /
    • 1999
  • This study examines the access points for electronic reference service system displayed on the home pages of academic libraries. Library home pages of national/public and private universities were examined, and these were classified into three groups according to the methods of displaying access points on the homepages. The advantages and disadvantages of each group were discussed and some suggestions were made for the user-friendliness and accessibility for the electronic reference service.

  • PDF

A reinforcement learning-based network path planning scheme for SDN in multi-access edge computing

  • MinJung Kim;Ducsun Lim
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.16-24
    • /
    • 2024
  • With an increase in the relevance of next-generation integrated networking environments, the need to effectively utilize advanced networking techniques also increases. Specifically, integrating Software-Defined Networking (SDN) with Multi-access Edge Computing (MEC) is critical for enhancing network flexibility and addressing challenges such as security vulnerabilities and complex network management. SDN enhances operational flexibility by separating the control and data planes, introducing management complexities. This paper proposes a reinforcement learning-based network path optimization strategy within SDN environments to maximize performance, minimize latency, and optimize resource usage in MEC settings. The proposed Enhanced Proximal Policy Optimization (PPO)-based scheme effectively selects optimal routing paths in dynamic conditions, reducing average delay times to about 60 ms and lowering energy consumption. As the proposed method outperforms conventional schemes, it poses significant practical applications.

A Fault-tolerant Network-based Mobility Management Scheme for Supporting Multi-media Services (방통융합 멀티미디어 서비스를 제공하기 위한 안정된 네트워크 기반의 이동성 관리 기술)

  • Lee, Sung-Kuen;Lee, Kyoung-Hee;Hong, Kang-Woon;Um, Tai-Won;Lee, Hyun-Woo;Ryu, Won;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.526-535
    • /
    • 2010
  • In this paper, we propose the fault-tolerant network-based mobility management scheme for supporting multimedia services of broadcasting & communications convergence in fixed mobile convergence (FMC) networks. The proposed scheme is based on AIMS (Access Independent Mobility Service) which is developed for the mobility support among heterogeneous access networks. To support stable location management and handover control for a MN, the proposed scheme supports stable management of binding information by sensing network attachment and detachment of a mobile node (MN). In addition, the proposed fault-tolerant (FT) AIMS supports a function of message retransmission for the support of handover control message and a function of heartbeat message transmission for the support of stable access network environments to a mobile node. We evaluate and analyze the performance of the proposed scheme through the implementation of AIMS system test-bed.